Overview
Through decades of working with public safety, government and enterprise customers, the Motorola Cyber Security Professional Services team has developed a holistic and methodical risk management approach that allows you to fully understand your cyber security risk posture related to your organization’s operational environment. It is a coordinated and regular re-evaluation of people, processes and technology to help your stakeholders and you receive carefully calculated and factual appreciation of applicable risk factors.
SCOPE. Only applicable controls spanning Technical, Management and Operational categories are selected to conduct a tailored risk analysis. Mitigation steps such as security architecture changes, integration of specific products or implementation of procedural control are recommended and discussed with the stakeholders only after the environment is methodically evaluated, risks are identified, analyzed, clearly understood and risk prioritized.
APPROACH. Using physical observation, in-person interviews, manual, computerized, commercially available and custom tools, Motorola will evaluate potential threat scenarios and assess potential risk implications to confidentiality, integrity and availability of the organization’s mission.
METHODOLOGY. All applicable risk factors are considered and taken into account prior and during the assessment. After capturing all necessary data pertaining to the scope of the assessment, a threat profile is developed and prepared as a Risk Scorecard report indicating low, moderate, high and critical values for each finding/issue identified. A remediation or risk acceptance recommendation will follow each finding/issue.
Framework
Motorola Solutions participated alongside government and industry partners to help develop the framework for Improving Critical Infrastructure Cyber security issued by the National Institute of Standards and Technology (NIST). This framework—comprised of leading practices from various standards bodies that have proved to be successful when implemented—is what we leverage to determine your current cyber security profile risk levels and recommendations.